Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 23:16
Static task
static1
Behavioral task
behavioral1
Sample
c944b1c3a2ec3d3141c00e8b83c4a88b5c76057f1119b3de079056fd65d2d33f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c944b1c3a2ec3d3141c00e8b83c4a88b5c76057f1119b3de079056fd65d2d33f.exe
Resource
win10v2004-20241007-en
General
-
Target
c944b1c3a2ec3d3141c00e8b83c4a88b5c76057f1119b3de079056fd65d2d33f.exe
-
Size
260KB
-
MD5
17e796c1d99911ce19512a8adb8ea55a
-
SHA1
e4e6aa0076157643919abbf26d9a444fd170d2e9
-
SHA256
c944b1c3a2ec3d3141c00e8b83c4a88b5c76057f1119b3de079056fd65d2d33f
-
SHA512
24c4e6e1303a817842d3a6019183d252abf24877aab184459782f7c1eac608feadf04f537164fec59e6ac30598759ccfb7fb7d85240fd5b527a15b8152951342
-
SSDEEP
3072:xXO0xmVPc4N9LLXf3D7n5ksUGMAHXijUgzYcYhvT+iyQuvM/h3R:VNmVPhN9LjDfUK3j/W8
Malware Config
Extracted
tofsee
svartalfheim.top
jotunheim.name
Signatures
-
Tofsee family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\bzvbykq = "0" svchost.exe -
Creates new service(s) 2 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2840 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\bzvbykq\ImagePath = "C:\\Windows\\SysWOW64\\bzvbykq\\olfgdlbi.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 2612 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2856 olfgdlbi.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2856 set thread context of 2612 2856 olfgdlbi.exe 43 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2088 sc.exe 2284 sc.exe 2824 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c944b1c3a2ec3d3141c00e8b83c4a88b5c76057f1119b3de079056fd65d2d33f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language olfgdlbi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2588 wrote to memory of 2064 2588 c944b1c3a2ec3d3141c00e8b83c4a88b5c76057f1119b3de079056fd65d2d33f.exe 30 PID 2588 wrote to memory of 2064 2588 c944b1c3a2ec3d3141c00e8b83c4a88b5c76057f1119b3de079056fd65d2d33f.exe 30 PID 2588 wrote to memory of 2064 2588 c944b1c3a2ec3d3141c00e8b83c4a88b5c76057f1119b3de079056fd65d2d33f.exe 30 PID 2588 wrote to memory of 2064 2588 c944b1c3a2ec3d3141c00e8b83c4a88b5c76057f1119b3de079056fd65d2d33f.exe 30 PID 2588 wrote to memory of 2532 2588 c944b1c3a2ec3d3141c00e8b83c4a88b5c76057f1119b3de079056fd65d2d33f.exe 32 PID 2588 wrote to memory of 2532 2588 c944b1c3a2ec3d3141c00e8b83c4a88b5c76057f1119b3de079056fd65d2d33f.exe 32 PID 2588 wrote to memory of 2532 2588 c944b1c3a2ec3d3141c00e8b83c4a88b5c76057f1119b3de079056fd65d2d33f.exe 32 PID 2588 wrote to memory of 2532 2588 c944b1c3a2ec3d3141c00e8b83c4a88b5c76057f1119b3de079056fd65d2d33f.exe 32 PID 2588 wrote to memory of 2284 2588 c944b1c3a2ec3d3141c00e8b83c4a88b5c76057f1119b3de079056fd65d2d33f.exe 34 PID 2588 wrote to memory of 2284 2588 c944b1c3a2ec3d3141c00e8b83c4a88b5c76057f1119b3de079056fd65d2d33f.exe 34 PID 2588 wrote to memory of 2284 2588 c944b1c3a2ec3d3141c00e8b83c4a88b5c76057f1119b3de079056fd65d2d33f.exe 34 PID 2588 wrote to memory of 2284 2588 c944b1c3a2ec3d3141c00e8b83c4a88b5c76057f1119b3de079056fd65d2d33f.exe 34 PID 2588 wrote to memory of 2824 2588 c944b1c3a2ec3d3141c00e8b83c4a88b5c76057f1119b3de079056fd65d2d33f.exe 36 PID 2588 wrote to memory of 2824 2588 c944b1c3a2ec3d3141c00e8b83c4a88b5c76057f1119b3de079056fd65d2d33f.exe 36 PID 2588 wrote to memory of 2824 2588 c944b1c3a2ec3d3141c00e8b83c4a88b5c76057f1119b3de079056fd65d2d33f.exe 36 PID 2588 wrote to memory of 2824 2588 c944b1c3a2ec3d3141c00e8b83c4a88b5c76057f1119b3de079056fd65d2d33f.exe 36 PID 2588 wrote to memory of 2088 2588 c944b1c3a2ec3d3141c00e8b83c4a88b5c76057f1119b3de079056fd65d2d33f.exe 38 PID 2588 wrote to memory of 2088 2588 c944b1c3a2ec3d3141c00e8b83c4a88b5c76057f1119b3de079056fd65d2d33f.exe 38 PID 2588 wrote to memory of 2088 2588 c944b1c3a2ec3d3141c00e8b83c4a88b5c76057f1119b3de079056fd65d2d33f.exe 38 PID 2588 wrote to memory of 2088 2588 c944b1c3a2ec3d3141c00e8b83c4a88b5c76057f1119b3de079056fd65d2d33f.exe 38 PID 2588 wrote to memory of 2840 2588 c944b1c3a2ec3d3141c00e8b83c4a88b5c76057f1119b3de079056fd65d2d33f.exe 41 PID 2588 wrote to memory of 2840 2588 c944b1c3a2ec3d3141c00e8b83c4a88b5c76057f1119b3de079056fd65d2d33f.exe 41 PID 2588 wrote to memory of 2840 2588 c944b1c3a2ec3d3141c00e8b83c4a88b5c76057f1119b3de079056fd65d2d33f.exe 41 PID 2588 wrote to memory of 2840 2588 c944b1c3a2ec3d3141c00e8b83c4a88b5c76057f1119b3de079056fd65d2d33f.exe 41 PID 2856 wrote to memory of 2612 2856 olfgdlbi.exe 43 PID 2856 wrote to memory of 2612 2856 olfgdlbi.exe 43 PID 2856 wrote to memory of 2612 2856 olfgdlbi.exe 43 PID 2856 wrote to memory of 2612 2856 olfgdlbi.exe 43 PID 2856 wrote to memory of 2612 2856 olfgdlbi.exe 43 PID 2856 wrote to memory of 2612 2856 olfgdlbi.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\c944b1c3a2ec3d3141c00e8b83c4a88b5c76057f1119b3de079056fd65d2d33f.exe"C:\Users\Admin\AppData\Local\Temp\c944b1c3a2ec3d3141c00e8b83c4a88b5c76057f1119b3de079056fd65d2d33f.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\bzvbykq\2⤵
- System Location Discovery: System Language Discovery
PID:2064
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\olfgdlbi.exe" C:\Windows\SysWOW64\bzvbykq\2⤵
- System Location Discovery: System Language Discovery
PID:2532
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create bzvbykq binPath= "C:\Windows\SysWOW64\bzvbykq\olfgdlbi.exe /d\"C:\Users\Admin\AppData\Local\Temp\c944b1c3a2ec3d3141c00e8b83c4a88b5c76057f1119b3de079056fd65d2d33f.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2284
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description bzvbykq "wifi internet conection"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2824
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start bzvbykq2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2088
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2840
-
-
C:\Windows\SysWOW64\bzvbykq\olfgdlbi.exeC:\Windows\SysWOW64\bzvbykq\olfgdlbi.exe /d"C:\Users\Admin\AppData\Local\Temp\c944b1c3a2ec3d3141c00e8b83c4a88b5c76057f1119b3de079056fd65d2d33f.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2612
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14.6MB
MD5b2f784d83ea728b6eaa2276379194f60
SHA1e5caedba8fbc98cfc259491f1e3a9abe00b99b51
SHA2563d2713334f36c02d1c55f45e0c5fe3db6f03f4aeac4fd98cea4364997300a5ba
SHA512fb70e005a88d21fd709a967c35ad2d5991e2405a7922da63f24de4c18756204079106257fef7490c3416a0e7c1fe5383061c2bc385a047e76c3956e9f1d2c842